-
1
-
-
84883105454
-
-
eToken. http://www.aladdin.com/etoken/.
-
EToken
-
-
-
2
-
-
84875683653
-
-
RSA securID http://www.rsa.com/node.aspx?id=1156.
-
RSA SecurID
-
-
-
7
-
-
0043232732
-
Users are not the enemy
-
December 1999
-
Adams A. and Sasse A. M. 1999. Users are not the enemy. Commun. ACM 42, 12 (December 1999), 40-46.
-
(1999)
Commun. ACM
, vol.42
, Issue.12
, pp. 40-46
-
-
Adams, A.1
Sasse, A.M.2
-
8
-
-
84860631786
-
Caché: Caching location-enhanced content to improve user privacy
-
Amini S., Lindqvist J., Hong I. J., Lin J., Sadeh N., and Toch E. 2011. Caché: Caching Location-Enhanced Content to Improve User Privacy. In Proc. of MobiSys.
-
(2011)
Proc. of MobiSys
-
-
Amini, S.1
Lindqvist, J.2
Hong, I.J.3
Lin, J.4
Sadeh, N.5
Toch, E.6
-
9
-
-
4644315235
-
Context-aware user authentication supporting proximity-based login in pervasive computing
-
Bardram J. E., Kjær R. E., Pedersen MØ. 2003. Context-Aware User Authentication Supporting Proximity-Based Login in Pervasive Computing. In Proc. of UbiComp.
-
(2003)
Proc. of UbiComp
-
-
Bardram, J.E.1
Kjær, R.E.2
Pedersen, M.Ø.3
-
12
-
-
34548769351
-
Fuzzy multi-level security: An experiment on quantified risk-adaptive access control
-
Cheng P., Rohatgi P., Keser C., Karger P., Wagner G., and Reninger A. 2007. Fuzzy Multi-Level Security: An Experiment on Quantified Risk-Adaptive Access Control. In Proc. of IEEE Symposium on Security and Privacy.
-
(2007)
Proc. of IEEE Symposium on Security and Privacy
-
-
Cheng, P.1
Rohatgi, P.2
Keser, C.3
Karger, P.4
Wagner, G.5
Reninger, A.6
-
13
-
-
84883113392
-
Protecting applications with transient authentication
-
Corner M. D. and Noble B. D. 2003. Protecting applications with transient authentication. In Proc. of MobiSys.
-
(2003)
Proc. of MobiSys
-
-
Corner, M.D.1
Noble, B.D.2
-
17
-
-
84873667233
-
Intuitive security policy configuration in mobile devices using context profiling
-
González M. C. Hidalgo C. A. Barabási L. A. 2008. Understanding individual human mobility patterns. Nature
-
Gupta A., Miettinen M., Asokan N., and Nagy M. 2012. Intuitive security policy configuration in mobile devices using context profiling. In Proc. of PASSAT.González M. C., Hidalgo C. A., Barabási L. A. 2008. Understanding individual human mobility patterns. Nature 453, 779-782.
-
(2012)
Proc. of PASSAT
, vol.453
, pp. 779-782
-
-
Gupta, A.1
Miettinen, M.2
Asokan, N.3
Nagy, M.4
-
18
-
-
84862104784
-
A diary study of password usage in daily life
-
Hayashi E. and Hong J. I. 2011. A diary study of password usage in daily life. In Proc. of SIGCHI.
-
(2011)
Proc. of SIGCHI
-
-
Hayashi, E.1
Hong, J.I.2
-
19
-
-
77950877250
-
So long, and no thanks for the externalities: The rational rejection of security advice by users
-
Herley C. 2009. So long, and no thanks for the externalities:The rational rejection of security advice by users. In Proc. of NSPW.
-
(2009)
Proc. of NSPW
-
-
Herley, C.1
-
21
-
-
79955930037
-
The true cost of unusable password policies: Password use in the wild
-
Inglesant P. G. and Sasse A. M. 2010. The true cost of unusable password policies: password use in the wild. In Proc. of SIGCHI.
-
(2010)
Proc. of SIGCHI
-
-
Inglesant, P.G.1
Sasse, A.M.2
-
24
-
-
84874875222
-
Of passwords and people: Measuring the effect of password-composition policies
-
Komanduri S., Shay R., Kelley P. G., Mazurek M. L., Bauer L., Christin N., Cranor L. F., and Egelman S. 2011. Of passwords and people: measuring the effect of password-composition policies. In Proc. of SIGCHI.
-
(2011)
Proc. of SIGCHI
-
-
Komanduri, S.1
Shay, R.2
Kelley, P.G.3
Mazurek, M.L.4
Bauer, L.5
Christin, N.6
Cranor, L.F.7
Egelman, S.8
-
26
-
-
77954482365
-
Risk-based access control system built on fuzzy inferences
-
Ni Q., Bertino E., and Lobo J. 2010. Risk-based Access Control System Built on Fuzzy Inferences. In Proc. of ASIACCS.
-
(2010)
Proc. of ASIACCS
-
-
Ni, Q.1
Bertino, E.2
Lobo, J.3
-
27
-
-
85066372453
-
Progressive authentication: Deciding when to authenticate on mobile phones
-
Riva, O., Qin, C., Strauss, K., Lymberopoulos, D. 2012. Progressive authentication: deciding when to authenticate on mobile phones. In Proc. of USENIX.
-
(2012)
Proc. of USENIX.
-
-
Riva, O.1
Qin, C.2
Strauss, K.3
Lymberopoulos, D.4
-
28
-
-
0005732885
-
-
ACM Press, New York, New York, USA
-
Orr, R.J. and Abowd, G.D. 2000. The Smart Floor: A Mechanism for Natural User Identification and Tracking. ACM Press, New York, New York, USA.
-
(2000)
The Smart Floor: A Mechanism for Natural User Identification and Tracking
-
-
Orr, R.J.1
Abowd, G.D.2
-
29
-
-
12844274372
-
Typing patterns: A key to user identification
-
IEEE, Sept.-Oct. 2004
-
Peacock, A., Xian, K., Wilkerson, M. 2004. Typing patterns: A key to user identification, Security & Privacy, IEEE, vol.2, no.5, pp.40-47, Sept.-Oct. 2004.
-
(2004)
Security & Privacy
, vol.2
, Issue.5
, pp. 40-47
-
-
Peacock, A.1
Xian, K.2
Wilkerson, M.3
-
30
-
-
79955930037
-
The true cost of unusable password policies: Password use in the wild
-
Philip G. Inglesant and M. Angela Sasse. 2010. The true cost of unusable password policies: password use in the wild. In Proc. of SIGCHI.
-
(2010)
Proc. of SIGCHI
-
-
Inglesant, P.G.1
Sasse, M.A.2
-
31
-
-
79958145496
-
Encountering stronger password requirements: User attitudes and behaviors
-
Shay R., Komanduri S., Kelley P. G., Leon P. G., Mazurek M. L., Bauer L., Christin N., and Cranor L. F. 2010. Encountering stronger password requirements: user attitudes and behaviors. In Proc. of SOUPS.
-
(2010)
Proc. of SOUPS
-
-
Shay, R.1
Komanduri, S.2
Kelley, P.G.3
Leon, P.G.4
Mazurek, M.L.5
Bauer, L.6
Christin, N.7
Cranor, L.F.8
|